We use cookies to ensure that we give you the best experience on our website. By
continuing to browse, we are assuming that you have no objection in accepting cookies.
You can change your cookie
settings at any time.

Computer security resources

Want to learn how to remove viruses and spyware from your computer, and how to keep it fast and clean?

If you suspect that your computer has been infected by adware, spyware, viruses or a Trojan, you can check out our short and to-the-point malware removal guides, to get rid of all infections. In this section, you can also find information on how you can prevent malware infections, how to spot vulnerabilities in your computer applications and how to ‘patch them up’.

Just browse through the materials below and take your pick.

Computer Security Resources articles

20

四月

2012

Picture this: you’ve just seen a great collection item on an online auction site and you want to place your bid. What if you actually get it at a cool price? That would b... Read more

22

二月

2012

Great planning rests on great networks

As with every successful event, behind every successful malware attack there’s a great planning process. Now, don’t think of an attacker as a mere well-organised event pl... Read more

8

八月

2011

Zeus Trojan removal

Zeus (also known as Zbot, PRG, Wsnpoem, Gorhax and Kneber) is a Trojan horse that steals banking information by keystroke logging and Form Grabbing. Zeus is spread mainly... Read more

5

八月

2011

Conficker Worm Removal

Conficker, also known as Downup, Downadup and Kido, is a computer worm targeting the Microsoft Windows operating system and it was first detected in November 2008.... Read more

22

十月

2010

annoying, but often benign malware that causes pop-up advertising and display advertising banners to appear while browsing the web and slows connections.... Read more

22

十月

2010

Malware means malicious software and it's often being used as an umbrella-term for harmful software that spreads online. There are different types of malware that serve d... Read more

22

十月

2010

Attempting or gaining access to someone's computer without their consent or knowledge is illegal all over the world – in the UK it is prohibited under the ‘Computer Misus... Read more

7

十月

2010

Firewall proxy

Proxy firewalls are the most secure types of firewalls, but this comes at the expense of speed and functionality, as they can limit which applications your network can su... Read more

7

十月

2010

Learn how TCP-IP Ports work

Internet Protocol (IP) is the method by which data is transferred across the internet. It does this by exchanging chunks of information called packets. A packet has two p... Read more